Management Platforms and Protocols For Internet of
Management Platforms and Protocols For Internet of
Article
Management Platforms and Protocols for Internet of
Things: A Survey
Jonathan de C. Silva 1 , Joel J. P. C. Rodrigues 1,2,3, *, Jalal Al-Muhtadi 3,4 , Ricardo A. L. Rabêlo 5
and Vasco Furtado 6
1 National Institute of Telecommunications (Inatel), Santa Rita do Sapucaí MG 37540-000, Brazil;
[email protected]
2 Instituto de Telecomunicações, 1049-001 Lisboa, Portugal
3 College of Computer and Information Sciences, King Saud University, Riyadh 11653, Saudi Arabia;
[email protected]
4 Center of Excellence in Information Assurance, King Saud University, Riyadh 11653, Saudi Arabia
5 Department of Computing (DC), Graduate Program in Computer Science (PPGCC), Federal University of
Piaui (UFPI), Ministro Petronio Portela Campus, 64049-550 Teresina, Piauí, Brazil; [email protected]
6 Graduate Program in Applied Informatics, University of Fortaleza (UNIFOR), Fortaleza CE 60811-905, Brazil;
[email protected]
* Correspondence: [email protected]; Tel.: +55-(35)-3471-9200
Received: 13 December 2018; Accepted: 12 January 2019; Published: 7 February 2019
Abstract: Internet of Things (IoT) management systems require scalability, standardized communication,
and context-awareness to achieve the management of connected devices with security and accuracy
in real environments. Interoperability and heterogeneity between hardware and application layers
are also critical issues. To attend to the network requirements and different functionalities, a dynamic
and context-sensitive configuration management system is required. Thus, reference architectures
(RAs) represent a basic architecture and the definition of key characteristics for the construction
of IoT environments. Therefore, choosing the best technologies of the IoT management platforms
and protocols through comparison and evaluation is a hard task, since they are difficult to compare
due to their lack of standardization. However, in the literature, there are no management platforms
focused on addressing all IoT issues. For this purpose, this paper surveys the available policies
and solutions for IoT Network Management and devices. Among the available technologies,
an evaluation was performed using features such as heterogeneity, scalability, supported technologies,
and security. Based on this evaluation, the most promising technologies were chosen for a detailed
performance evaluation study (through simulation and deployment in real environments). In terms
of contributions, these protocols and platforms were studied in detail, the main features of each
approach are highlighted and discussed, open research issues are identified as well as the lessons
learned on the topic.
1. Introduction
Initially, computer networks were created for communicating as a mean of sharing endpoint
devices with the same standards of networks, protocols, and operating systems. However, the fast
evolution of networks combined with a reduction of computational resources costs motivated the
increase of computer networks in all markets [1]. Considering this scenario, it becomes increasingly
necessary to manage the network environment to keep it working properly. Network management
is required to maintain the entire network structure working, thus meeting the user needs and the
administrators’ expectations.
Due to the emergence of the Internet of Things (IoT), it is expected an exponential growth
of network endpoint devices (NEDs) becoming a challenge in the areas of infrastructure, security,
energy saving, among others [2]. The continued growth in the number and diversity of network
components has also contributed to the fact that network management activity has become increasingly
indispensable [3]. The benefits of integrating a company’s computing systems of different nature
and sizes as a way of distributing tasks and sharing available resources are now a reality. For this
reason, an efficient data management system is required by IoT networks, so the information is always
available wherever and whenever requested [4].
IoT management presents two main scopes: devices and networks. In each of them, there is a
huge variety of protocols and management platforms to minimize the challenges (presented later) [5].
Given the number of existing protocols and platforms, an evaluation should determine which IoT
management protocols are capable of efficiently satisfying the application requirements and which
platforms support these protocols for real environments (real deployment).
Communication between devices performing machine-to-machine communication (M2M),
Wireless Sensor Networks (WSNs) for monitoring and control processes, and the interconnection
of WSNs with the Internet are examples of some challenges of managing an IoT network [6].
Network devices using software-based communication (known as software-defined networks—SDN)
gathers, detects, and configures data from sensors, thus creating the context of managing a network.
New technological approaches focusing on IoT are emerging, as Fog/Cloud technologies [7], and they
are compatible with constrained portable devices and with old management protocols, therefore
being an IoT trending topic. Figure 1 presents a typical scenario involving different communication
technologies and a gateway where connected devices collect information from the environment
(e.g., temperature, luminosity, movement, etc.) and report data to an IoT management network entity.
One of the most important challenges in this IoT scenario is the network device heterogeneity [8,9].
Devices can support different communication protocols with different formats and data types, memory
and processing capacity [10]. Another important factor is the data set produced in real time and
the implicit semantics imposing challenges regarding the configuration and infrastructure of IoT
environments [11]. An illustration of the heterogeneity of protocols for IoT is shown in Figure 1.
The complexity of IoT Network Management compared with traditional Transport Control
Protocol (TCP)/IP networks management is also greater than WSNs [12]. IoT needs to support
Sensors 2019, 19, 676 3 of 40
networking devices and services that involve (i) the use of a plethora of devices with diverse
characteristics, and (ii) the IoT networks devices interaction through local or remote management
context awareness. WSNs should manage frequent communications failures and low security of
wireless links (i.e., the MANNA architecture [13]), and this management must also be context aware.
The available IoT management architectures partially attend to these features [14]. Therefore, this
survey elaborates on a deep study of the related literature focusing on available solutions, tools,
and policies, including approaches for IoT networks and end devices management. Among the
available technologies for IoT, an evaluation was performed using features its heterogeneity, scalability,
supported technologies and security. Based on this evaluation, the most promising technologies were
chosen for a detailed performance evaluation study (through simulation and deployment in real
environments). Then, the main contributions of this paper can be summarized as follows:
• An extensive review of the related literature considering network management protocols and
platforms for IoT;
• Requirements analyses for IoT network and devices management;
• A comparative analysis of the available IoT protocols and network management platforms for IoT;
• Identification of challenges and open research issues on IoT management and its importance for
further studies on the topic.
2. Background
Computer networks are composed by heterogeneous communication devices and sharing
resources [15]. Computer networks management emerged after a rapid evolution of network
technologies, in addition to a major effort to reduce the costs of computing resources [16]. The offered
services range from simple resources sharing to current technology and assume that every object can
be connected to the Internet. This is known to as the IoT. Network management goals controlling
and monitoring network elements, physical or logical, ensuring a certain quality of service (QoS)
level. To accomplish this task, define network management as a collection of tools for monitoring or
managing devices [17]. The traditional network management model can be summarized as follows:
(i) data collection from monitoring managed resources automatically, (ii) diagnosis to analyze and
solve identified problems throughout the monitored data, and (iii) action or control to solve a problem
or modify the state of a device [18].
For Kurose et al. [18], a network without management mechanisms can present problems such as
interference in data traffic, lack of data integrity, high congestion rates, resources that can be misused
or overloaded, as well as security problems. According to Gabdurahmanov [19], network management
can be difficult for three reasons: (i) the managed network is heterogeneous because it contains
hardware and software components manufactured by various companies; (ii) technology can change
continuously with new services available; and (iii) the managed networks are large and the network
nodes may be distant from other nodes.
Kurose et al. [18] states that ISO has created an IoT reference architecture (RA) in which
network management includes five functional areas, as follows: performance management, failure,
configuration, accounting, and security (as shown in Figure 2). Performance management intends to
analyze, measure, inform, and control the performance of different network components, i.e., routers
Sensors 2019, 19, 676 4 of 40
and hosts. In failure, the purpose is to log, detect, and react to network failure conditions. The division
between fault management and performance management is undefined [20]. Failure management
can occur through transient network failures, such as the interruption of service on a link or routing
software. Performance management, however, takes a long-term approach.
The administrator can know the managed network devices and their hardware configurations
through management actions [21]. Accounting is intended to allow the network administrator to
specify, register, and control access to users and devices of the network. Quotas and usage charges
for privileged access to the network resources make up the accounting management. According to
organization policies defined, the network resources access is performed with security management.
In Figure 3, the general architecture of network management systems presents the following four
basic components: elements, stations, protocols, and information on network management [18]. They
are briefly described below.
Agent: The managed elements have a software that allows monitoring and controlling the
equipment through one or more management stations;
Manager: Management station communicates with the agents, either for monitoring or controlling
them. Usually, the management station offers an interface through which authorized users can manage
the network;
Protocol: The standard protocol, used for operations of monitoring (reading) and control (writing);
it is necessary for information exchange between manager and agent devices;
Management information: The management information has the data that can be referenced for
operations by the management protocol, i.e., the managers and agents can exchange data to obtain
information such as the Simple Network Management Protocol (SNMP) protocol [22].
Since the proposal of IoT years ago, many ideas have had three main constraints that
restrict its development [23]: (i) proprietary communication protocols, (ii) security and privacy,
and (iii) inconvenience to manage. Thus, the paper focuses on network and Device Management and
if it is feasible to address management constraints.
Due to the specific characteristics and challenges of IoT, devices cannot be managed using only the
traditional management tools. Thus, IoT management has two categories: IoT Network Management
and IoT Device Management. IoT Network Management is required to collection and analysis large
volumes of data from IoT platforms and, consequently, provides efficient decisions and/or actions.
IoT Device Management is required to provide the device location and status information, e.g., update
embedded software, disconnect some stolen or unrecognized device, modify security and hardware
configurations, locate a lost device, and even enable interaction between devices.
Sensors 2019, 19, 676 5 of 40
The main difference between WSNs, AdHoc networks (MANETs), and IoT networks is the
characteristic of heterogeneous devices and topologies performed by these networks [25]. All the time,
new devices compose these networks, therefore, the IoT management platforms require a customized
Sensors 2019, 19, 676 6 of 40
module (driver) to translate device functionality into the platform. Some platforms for WSN and
AdHoc networks can be used to IoT networks.
3.1. Requirements
IoT management solutions must meet some requirements [14]. For example, there must be
interoperability between platforms and network devices. The platform must obtain the connected
devices dynamically through discovery and management. A solution should be context aware and
support scalability (considering indications of intensive usage). Security and dynamic adaptation
should keep data integrity and privacy guaranteeing devices availability and QoS.
Existing IoT management platforms, however, only partially meet these requirements [14]. Due to
lack of standardization, IoT management needs to specify data and information models, in which these
models are used to define a format for storing and deploying other management services. In addition
to the above requirements and other aspects such as security, authentication and authorization, there
are characteristics in the scope of local and global management which are discussed in [26].
3.2. Features
In the IoT reference architecture [27], network management includes functional components.
Configuration (self-configuration) is responsible for initializing system configuration, i.e., collect and
store the device configurations, tracking configuration changes, and planning future extensions.
The self-aware component, Failure, identifies, isolates, recovers, and records failures in an IoT
system. For each occurrence of a failure, a notification is sent to the Failure component with the
objective of collecting more data to identify the type and degree of the problem.
Member is responsible for monitoring and recovering members. This component allows
recovering members of the system while obeying a certain filter and allows the subscription to
receive updates of register/unregister member metadata in the database.
Report refines and maintains the history of the information provided by management devices,
e.g., to determine the efficiency of the current system through the collection and analysis of
performance data.
State goals self-monitoring of the IoT system with the past, present, and future devices states. It is
required by the Failure component, having the functions of changing or applying a particular state in
the system. It also checks the consistency of commands provided for this function and monitors the
state, which makes it possible to predict and update the state for a certain time or to recover the state
of the system through a history.
- SNMPv1: it offers a management solution with low cost and simple implementation, but with a
lack of authentication and security mechanisms and limitation in the performance of messages in
very large networks.
- SNMPv2c: it created the management of decentralized networks, allowing the existence of more
than one management station and, consequently, the exchange of information between them.
In SNMPv2, it was not possible to reach a consensus regarding the security standard to be used
in SNMP, and there was an addition of other request types such as get-request, get-next-request,
set-request, response, and snmpV2-trap.
- SNMPv3: it published a set of documents defining a framework to incorporate security features
into full capacity (with the SNMPv1 or SNMPv2 features). The SNMP architectural model
includes a Management Server and network devices. Servers monitoring and control the network
devices with events. The network devices include equipment as hosts, gateways, terminal servers,
that have managing agents used to be handled by a server. The SNMP protocol is used to
exchange data between a server and network devices.
Figure 5, shows some of the possible interactions between manager and agent through the SNMP
protocol [31].
Use Case
The SNMP protocol is a base unit that provides a centralized platform for operations and
facility management teams to monitor sensor conditions and configure threshold-based alerts. It aims
to monitor and collect data from environmental sensors and to integrate data from equipment
such as generators and other devices enabled to integrate with intelligent sensors through SNMP,
as demonstrated by OpenNMS, which is an open-source platform [34].
After establishing the secure transport session between client and server, the NETCONF protocol
sends a HELLO message to announce the protocol capabilities and supported data models. NETCONF
also supports the subscription and receipt of event notifications asynchronously as well as the
partial closing of a current configuration of a network device. This feature allows multiple editing
sessions, streamlining the configuration process. NETCONF allows monitoring and management of
an autonomous entity (the NETCONF manager) that uses the repository of data, sessions, closings,
and statistics available on the NETCONF server.
The NETCONF protocol transports this information to an application manager, who can infer the
required settings for the network devices. YANG is a formal language with clear text of the data model
with syntax and semantics that allow the construction of network applications [36]. The YANG model
Sensors 2019, 19, 676 9 of 40
can be translated into an XML (Extensible Markup Language) or JSON (JavaScript Object Notation)
file, structured in a tree for each module, with properties that correspond to the functionalities of the
device and declarations of types, data, constraints, and additions of reusable structures.
Heterogeneous networks are characteristic of the IoT, and the NETCONF protocol is used to
efficiently manage and resolve issues of this network. Most operating systems developed for IoT [37]
such as TinyOS and Contiki OS already have the NETCONF protocol built into their operating system.
Pros: Robust and security features.
Cons: a data model and an architecture of standardized implementation.
Use Case
Currently, most vendors, e.g., Cisco, already use the NETCONF protocol on their equipment as a
standard model. Another example, the OpenFlow devices controller communicates with connected
devices in an SDN architecture, also defining a protocol for such communication. The OpenFlow
provides means to control network devices using NETCONF, without the need for manufacturers to
expose the code of their legacy products [38].
The OVSDB protocol interface to execute the configuration and management operations on the
OVS instance. OVSDB is used to create/delete/modify bridges, ports, and interfaces. The OVS
represents an evolution of network management protocols, allowing programming and configuring
bridges, ports, and interfaces for SDN equipment platforms and Network Functions Virtualization
(NFV) [40].
Pros: Interoperability of the networks and SDN management network.
Cons: No standard model to other networks and security features.
Sensors 2019, 19, 676 10 of 40
Use Case
The open-source OpenDayLight platform for SDN uses open network management protocols, i.e.,
SNMP, OVSDB, and NETCONF to provide modular functions, extensible control, and network device
monitoring [41].
The XMPP protocol is an open-source IETF standard protocol based on XML for network
management in IoT contexts, which allows real-time messaging, the information exchange and
request/response services. The XMPP performance of latency, scalability, and robustness has been
widely demonstrated during the years [43].
The PIC-M module is used to manage the configuration and access of the other modules to the
platform. It interacts as an interface to applications and other platform components.
The PIC-M functionalities consist in notifying the applications on the status of the device available
in the middle-ware, requesting configuration information from the PIC-A via “get” and “set”, through
an XMPP command, and updating the configuration of devices through PIC-A via XMPP.
The IoT-PIC uses the publish-subscribe, in which subscribers only receive messages of interest,
without information on the publishers, which allows the complete decoupling of the devices.
Each platform is associated with a PIC-A and responds to the management of the PIC-M device.
The configuration and interconnection of devices are assigned to the PIC-A, e.g., adding and removing
the connection.
The IoT-PIC deploys the discovery functionality of devices through the XMPP protocol.
New devices connected are automatically registered to the network, describing their functionalities
with a common format [44]. Particularly, in the proposed solution, when a new device connects to the
network, the manager of this network publish-subscribe joins in PIC-M for all discovered resources.
A resource example is a sensor that measures humidity and temperature. Context Manager can
create location-related nodes where devices can enter their location allowing navigation of the tree
from the root. First, the PIC-M creates a collection node with a given device id, containing two nodes,
in which the first node has the temperature function and the second node has the humidity function.
Sensors 2019, 19, 676 11 of 40
The resources of the nodes used in the service discovered by PIC-M are associated with the resource
types list, i.e., Humidity Sensor and Temperature Sensor. The functions of the nodes are associated with
the operation list, i.e., getTemperature and getHumididity. This list creates the entire hierarchy of nodes
and, if the user does not indicate the parameter, the entire list is returned.
Pros: Interoperability and global/local management.
Cons: No mature protocol and security feature.
Use Case
The IoT-PIC is used in an energy efficiency scenario. The IMPReSS platform [45] includes energy
saving and alarm system applications to allow sensor, lights, and smart plugs into the platform.
To save energy, the Energy Saver manages the light through the PIC-M and tells the PIC-A of the lights
management component to publish/subscribe node of the device in order to receive its events; e.g., in a
classroom, detects motion sensor if a row of seats is empty, in which case the lights are automatically
switched off.
The GUI interface converts the XML returned by response of the PIC-M into a user-friendly form.
This platform allows integrating new devices without need modifications to the deployment environment.
An intermediate layer used to exchange messages (Table 1), is called Control Message Data Units
(CMDUs), with all standards-compatible devices. In Figure 11, all the IEEE 1905 deployed devices with
Abstraction Layer Management Entity (ALME) protocol have neighbor discovery, topology exchange
and rules, measured traffic, and security associations following the layers presented.
The protocol introduces an intermediate abstraction layer to the logical link control (LLC) and one
or multiple MAC. The service access points (SAPs) holds many networking technologies, to support
advanced network management features such as auto-configuration, QoS, path selection and discovery.
This layer simplifies setup, e.g., by eliminating the need for a user to enter different passwords to
access each link [47].
This ALME SAP entity can provide management services to MAC, physical layer (PHY) and
higher layer entities (HLEs) [48]. It also provides advanced network management features including
discovery and interface selection.
Pros: Interoperability and common standard model to devices.
Cons: No mature protocol and security feature.
Use Case
nVoy is an IEEE 1905 standard program [49] that provides the services to maximize and simplify
the overall performance of a home network. The reliability is provided through the abstraction layer
to established power line, wireless, coaxial cable, and Ethernet home networking technologies—IEEE
1901/HomePlug
R AV, Wi-Fi, MoCA
, R and Ethernet, allowing to provide common setup procedures
for establishing connected devices, secure links, and network management.
Exists two successive management operations that entities within the 6LoWPAN performed. First,
Network Discovery is executed to monitor the device state in the architecture. The second step, after
discovered devices, is the management of available devices.
To discover “live” devices manually, intense use of the resources is needed, and thus, the Network
Discovery is a procedure created for an automated network state discovery, which is necessary given the
WSN characteristics for their continued deployment. In this proposal [53], the Network Discovery uses
the automated monitoring of the network state distributed by a 6LoWPAN network. The coordinators
responsible to maintain the information about device state and reporting of subordinate devices has the
device discovery feature. Bandwidth is a scarce resource in a sensor network and this feature reduces
communication costs. The sensing and processing are usually lower than the communication cost.
It is desirable to monitor the device’s status within the 6LoWPAN in a standard management
protocol, e.g., SNMP protocols. However, the bandwidth available is a factor limited for application
layer payload [54]. Therefore, SNMP is inviable due complexity of transport and communication
into 6LoWPAN networks. Nonetheless, the reuse of network protocols is a goal of the 6LoWPAN,
especially because of the interoperability of devices with SNMP. The SNMP message is translated to a
UDP-based query when arrives from an NMS. It contains identifiers objects that are retrieved by the
Device Agent. Likewise, these objects are translated to SNMP format when arriving at the gateway.
Figure 12. Illustration device level monitoring procedure for LNMP Protocol.
Use Case
In this proposal [53], the Internet Lab Ajou University deployed an agent application over the
6LoWPAN and a PAN coordinator connected to the gateway with PPP interface. The 6LoWPAN
environment composed of a gateway and IEEE802.15.4 devices, containing a PAN coordinator.
The devices support Hilow [55] routing protocol. The Device Management agent access to 802.15.4
information base, 6LoWPAN MIB, and IP MIB reduced.
Sensors 2019, 19, 676 14 of 40
5.1. IMPReSS
The IMPReSS project is a partnership between the European Union and Brazil (EU-Brazil).
The goal of the project was to provide a development platform that allows low-cost development
of IoT complex systems and facilitates interaction with users and external systems [45].
The IMPReSS project ended on 31 March 2016.
The IMPReSS development platform can be used by any system that adopts the Smart Society
context. The demonstration and validation of the IMPReSS platform will be carried out on energy
efficiency systems to reduce the use of energy and CO2 emission in public buildings. One contribution
will be the inclusion of intelligence in monitor and control systems, as well as the stimulation of user
awareness in reducing energy expenditures. For the configuration management, the PIC-A exposes
two ad-hoc commands, in Table 2. The first command provides a list of management data, in XML
format, associated with every variable, i.e., the type, the current value, and a list of values to assign.
The second command updates values associated with a variable when this is writable [58].
The application interacts with PIC-M that provides setConfiguration and getConfiguration
commands to write and read the configuration in any PIC-A. When setting information in parameters,
the setConfiguration should be called, passing the XML used to insert new configuration values.
Pros: Supports the IoT-PIC protocol.
Cons: No basic security and no support of the commercial protocols.
5.2. OpenNMS
OpenNMS (Network Management System) open-source platform [34] is used to the management
and monitoring of business networks. Developed under the FCAPS (Fault, Configuration, Accounting,
Performance, Security) network management model, it is distributed under the GPL license.
OpenNMS is written in Java, in addition to using database PostgreSQL or RRDTool, specifically
JRobin (Java port for RRDTool), and supports Red Hat, Debian, Fedora, Mandriva, SuSE, Solaris, Mac
OS X and Microsoft Windows.
The architecture presented in Figure 13 has the features to determine the availability and
latency of services, storage and collecting of data, event management (such as SNMP traps), alarms
and notifications.
Sensors 2019, 19, 676 15 of 40
It uses two flows for data collection in Round Robin Database (RRD). The first is through so-called
monitors that connect to a network resource and perform a test to verify if it responds correctly. If this
does not happen an event is generated. The second flow is through the use of so-called collectors,
which can be collected by SNMP (native protocol), NETCONF, Java Management Extensions (JMX),
and HTTP.
The generated events are of two types; those generated internally by OpenNMS and those
generated externally by SNMP traps, which are characterized according to their description and
gravity [59].
Pros: It supports many Operation Systems and open source.
Cons: No basic security and support SNMP native.
5.3. OpenDayLight
The OpenDayLight (ODL) is an open-source Web-platform for network management as SDN.
It uses open protocols to allows centralized control and network device monitoring [41]. The ODL
supports OpenFlow and offers ready-to-install modular network solutions. There is support for a
wide range of network protocols, including SNMP, NETCONF, RESTCONF, OVSDB, Border Gateway
Protocol (BGP), Path Computation Element Protocol (PCEP), Locator ID Separation Protocol (LISP),
and more. OpenDaylight is slightly different from other controllers because it offers other protocols
such as southbound interfaces, e.g., OpenFlow, BGP, and PCEP. In addition, OpenDayLight offers
interfaces with OpenStack and Open vSwitch (OVSDB).
OpenDaylight is a micro-service that uses the sharing of YANG-based (NETCONF) data structures
for messages exchange and data storage, as shown in Figure 14. According to Haleplidis et al. [60],
through a model addressed to the Model Driven Service Abstraction Layer (MD-SAL), can aggregate
any application or function to a service and loaded by the controller.
Pros: It supports the interoperability of the networks and many native protocols.
Cons: No basic security.
5.4. Zabbix
Zabbix is an open-source tool distributed under the GNU GPLv2 license for network management.
It monitors the network services status as well as servers or other hardware. As described in [61],
it is characterized as being a centralized management system with semi-distributed monitoring.
In Figure 15, the organization can be divided into three main modules.
The platform architecture is distributed and consists of a central server in charge of administering
the system and dealing with the interaction between the other two main components: (i) the
“Zabbix Agent” to monitor local resources and applications and send them to the server, and (ii) the
“Zabbix Proxy” is an optional part of the Zabbix configuration essential for distributed monitoring [62].
Zabbix proxy collects the data from the hosts and stores them in a database of their own to avoid loss
of information if there is a problem with the communication with the server. The alert system includes
three channels for sending notifications via email, SMS, and jabber (currently called XMPP—Extensible
Messaging and Presence Protocol).
Pros: Mature platform and has a greater number of management metrics.
Cons: No basic security and only monitoring the networks.
agent and can communicate with the network. Semi-managed devices implement some parts of the
managed devices, e.g., only feature control, but not software management [65].
Technology Description
The IETF has defined a binary protocol, the Constrained
Application Protocol (CoAP), easy to analyze and especially designed for
CoAP
constrained devices, which is used with lower-level protocols, but it is
particularly adapted over UDP/IPv6.
OMA Lightweight M2M is a Device Management protocol used
OMA-LwM2M
to M2M networks environment.
OMA Device Management provides functions for device
management. The Device Management happens through communication
OMA-DM
between a server (Device Manager) and the client (Device Agent)
using HTTP transport.
OMA-DM performs data exchange and Device Management with XML data through a DM
server/client communication [78]. The OMA-DM consists of two phases: (i) a configuration phase,
after authentication enables the exchange of device information through the user commands (Add,
Alert, Copy, Get, and others) sent to the DM Client; (ii) the management performs the request/response
messages (Status, Generic Alert, and Results) between DM server/client.
Pros: Standard communication model.
Cons: No supports the heterogeneity networks and security.
Sensors 2019, 19, 676 19 of 40
The M2M Service Provider, Network Service Provider, or Application Service Provider can be
hosted by the LWM2M Server that provides a private or public data center [80]. The LWM2M Client
is integrated into a software or device [81]. The LWM2M communication model [82] uses the CoAP
methods (GET, PUT, POST, and DELETE) with bindings over UDP transport layer.
Pros: Communication model and secure.
Cons: No supports the heterogeneity networks.
Use Case
Nowadays, there are several solutions (CoAP, OMA-LwM2M, or OMA-DM) with COMAN
requirements, e.g., energy states, logging, system authentication, peripheral management, and access
controls to the system [66]. Sprint is globally one of the best examples of a mobile Operator that has
made FOTA part of its services strategy.
It is fully committed to providing FOTA updates according to the OMA-DM standards [83].
In Table 4, the TMP creates the connection between protocol and transport layer protocols and
includes several operation request/response messages in the protocol, e.g., GetInformationObject and
SetInformationObject.
Use Case
The Smart Street Lighting System [86] can be managed remotely using Thing Management
Protocol and some tasks can be automated with the objective of reduction of the power consumption,
which has an ecological implication.
the high volume of CPE for a single ACS. Thus, there is a proposal of addiction the components of the
ACS management architecture using dynamic grouping, and sub-ACS structure [90].
The ACS can control the CPE through the get and set methods as parameter values. In the
first message, the CPE sends CPE information, e.g., identification, manufacturer, and serial number
to the ACS. Then, ACS sends a request with parameters for CPE to execute. After receiving all
the answers or does not have requests, CPE closes the session. An Inform message initialize the
management session. The client identifies this message, which is confirmed by an InformResponse
message by the server. Subsequently, the client can request or assign one or more parameters
with a GetParameterValue and SetParameterValue message. Both messages are committed with
a SetParameterResponse or GetParameterResponse and the parameter values are updated. Finally,
a management session is finalized.
Pros: Secure auto-configuration and standardize management of devices.
Cons: lack of standard for different devices.
Use Case
Incognito ACS is an integrated system to the SAC [91]. It allows to manage copyright of the
subscribers, e.g., group of channels or videos on demand over IP. The SAC authorizes TR-069 gateway
activation and diagnostics. In the gateway it is possible to execute commands to learn about devices,
services, or customer quality. As another use case example, the COSMOS (CPE Operation Support
Management and Optimization System) is a CWMP-based Operations Support System (OSS) used
to provide integrated multi-function which has an easy to use operating environment. Multi-vendor
CPEs (common gateways) are managed by COSMOS, and this system is described in [92].
The ManIoT standardizes the data model and format used to applications, services, and devices
communications. The device’s status (on/off) and the Id (identification device) are characteristics used
to model information. To integration with external systems, the platform uses popular protocols and
data models of the industry, e.g., XML and RESTful API.
The ManIoT project has two management scopes, Local and Global/Remote. The Local Manager
acts to control events performed by a user or application devices that make up a particular scenario,
for example, turning a water valve on or off. The remote manager standardizes the actions by users in
different scenarios, consumption rates in various areas defined by the water utility.
• Application Layer: The first layer consists of applications that use data provided by one or
more devices, as well as platform services. Network users access applications through a Web
interface, and these applications, in turn, interact with ManIoT using function calls. Each
application requests the platform to perform actions on the sensors based on the implemented
scenario, e.g., an energy management application requests turning an air conditioner on or off to
reduce consumption.
• Service Layer: The second layer is formed by the services that support the applications and use
the abstractions implemented by the drivers to communicate with the devices. Among the items
in this layer are Storage, Scheduling, Authentication, Settings, Communication, Events, Conflict
Management, and Context Management.
• Adaptation Layer: This layer is divided into two parts, the first one being responsible for
standardizing the data and the second for dealing with the specificities of each device. Each device
type has a specific driver that abstracts the specificities of access to its sensors and actuators,
which allows the management of the services in an integrated way.
• Communication Layer: The layer consists of the different device access protocols. As mentioned
earlier, the network may consist of devices that can use different application protocols (i.e., UPnP
or proprietary protocol) and different networks (ZigBee, Wi-Fi).
• A Layer of Things/Devices: The last layer has the “Things”. There are two devices type: the real
devices and the virtual devices. The actual devices are sensors and physical actuators, e.g.,
an intelligent lamp (actuator), a pressure sensor (sensor). Virtual devices have already captured
Sensors 2019, 19, 676 23 of 40
information from a server connected to a TCP/IP network, e.g., a calendar or email service, or a
social networking server.
The global services have the functions as those development in the local scope, as shown in
the second layer of Figures 22 and 23. Global scope services handle larger data sets and provide
support for more comprehensive applications. For example, in the context of electrical management,
the global manager must have the ability to manage possible power outages in several residences in a
neighborhood. The actions defined by the global services are sent and executed in the devices of the
respective local managers, using a TCP/IP connection.
Pros: Context aware and scalability
Cons: Privacy, security, supports few native protocols.
Sensors 2019, 19, 676 24 of 40
Use Case
In the Intelligent Lighting Scenario, the lighting of an environment is adjusted with the presence
of people and the existence of natural light. Bulbs are switched conform a person move in the room.
Light intensity is inversely proportional to the amount of natural light.
The ManIoT prototype consumes approximately 0.05% of the bandwidth of these networks
in the worst case [93]. These values are justified because of the small amount of data exchanged
between the prototype of the Local Manager and the devices, thus reinforcing the minimal use of
hardware resources.
There were results obtained with scenarios of intelligent lighting and automation of tasks using
appropriate metrics to show the capacity of ManIoT to provide a dynamic adaptation and context
science to the environment.
8.2. Fiware
Fiware is an open cloud platform, illustrated in Figure 24, under development and created in a
European FP-7 Project to support future Internet. Considered important to several areas, the Fiware
has a set of generic enablers (GEs) [94]. According to standard IoT-RA (Figure 1), only the member
function is implemented in Fiware Technologies. The platform offers support to various management
protocols and standards. It supports OMA NGSI9/10, OMA LWM2M, MQTT, CoAP, and IPv6 [95].
The heterogeneous wireless networks have specific communication protocols to connected devices.
Different data encodings make it difficult to find a global deployment.
The platform, illustrated in Figure 24, has a modular architecture that supports several IoT
protocols, in which modules are called IoT Agents. However, the integrators must determine the
protocol that will be used to connect and select the IoT Agent correct. The IoT Manager collects or
sends data to devices that use heterogeneous protocols and translates them to a standard platform,
simplifying the Device Management and integration [96].
Pros: Simplicity and interoperability.
Cons: Vulnerability, privacy, and security.
Use Case
The Fiware project is used for orthopedics, podiatry, physiotherapists, and related health services
producing prosthesis. This work is time-consuming, cost-inefficient and causes many inconveniences
to patients. The Ortholab aim is to produce advanced scan and manufacturing solutions to the insole
sectors. With the Ortholab solution, orthopedists or physiotherapists will be able to take digital
information of the patient’s body part in an easy way and specify the parameters to 3D printers [97].
Sensors 2019, 19, 676 25 of 40
8.3. ONEM2M
ONEM2M was first released in 2015 and is a partnership project created to establish
access-independent M2M service layers specifications. For the management protocol, it has its own
technology called Device Management (DM) and it is also evaluating the possibility to implement
OMA-DM, OMA-LWM2M or even CWMP [98,99]. This platform has its own system and protocols,
as described in [100].
Two basic types of entities make up the functional architecture of ONEM2M: AE (Application
Entity) and CSE (Common Services Entity), as shown in Figure 25. Northbound and southbound
connected devices are considered an AE. The AE needs to be aware of management data protocols or
models. Device Management (DMG) enables Device Management capabilities in MNs (for example,
M2M Gateways), ASNs, and ADNs (for example, M2M devices). Connected devices residing in an
M2M network are managed by services provided by DMG. The information obtained from the AE is
used for network administrative actions (e.g., diagnostics, troubleshooting) [101].
The Management Server/Client interface is the Mcc, which uses a Device Management technology
(e.g., CWMP, OMA-DM, and LWM2M). Device management technology is used to manage the entities
(MN, ASN or ADN, and DMG) and translates requests from other CSEs or from AEs to the Device
Management technology. The Mcc interface is technology dependent, as above-described.
Pros: Interoperability and compliance of services.
Cons: Maturity and artificial intelligence.
Use Case
The home lighting use case [102] performs remote control of the lights in a home through a user’s
smartphone in the following manner: (i) the lights are deployed and communicate with home gateway;
(ii) the home gateway communicates with the cloud platform, making it possible to control the lights
remotely with the smartphone; (iii) the cloud platform supports services to enable the smartphone
to control the lights, e.g., discovery, data management, group management, publisher/subscriber,
and others; (iv) the user’s smartphone hosts an application used to remotely control the lights, i.e.,
change light state (ON/OFF), discover available lights in the house, among other functions.
8.4. SmartThings
SmartThings is an open-source solution used to build applications and connect with other devices.
It allows new connected applications and supports applications (SmartApps) that communicate with
other WebServices through RESTAPI. The SmartThings architecture illustrates the infrastructure
Sensors 2019, 19, 676 26 of 40
blocks that interaction with the devices shown in Figure 26. Communication of devices (sensors
and actuators) with application is performed by the HUB entity. The messages are received,
identified, and analyzed by a user device on the Device Handler. The response message is
discriminated by JSON in SmartThings events. SmartApp handles devices through events managed
by Subscription Management.
Pros: Interoperability and secure services.
Cons: It is not an open-source platform and uses a specific API.
Use Case
The SmartThing project is used to optimize simple tasks in daily life. Between the functions used,
the following were identified: presence sensors for security and light control, scheduling of house
cleaning, and a sensor to get notifications when mail is received [103].
8.5. RestThing
The RestThing platform [104] is a Web service infrastructure based on REST with the purpose
of hiding the devices heterogeneity and integrate devices into a network. This platform enables
developers to build applications accessing physical and Web services, which are both manipulated by
a REST-style interface.
As shown in Figure 27, the RestThing elements are: (i) applications; (ii) RESTful API; (iii) service
provider; (iv) adaptation layer; (v) embedded devices, and; (vi) Web resources.
Sensors 2019, 19, 676 27 of 40
The RESTful API transmitted the data between sensors, gateways and Web applications using
three types of data formats: JSON, XML, and CSV. For access to RESTful objects, the HTTP protocol
operations used are: the GET method, used to retrieve the current device state; the PUT method, used
to modify this device state; the POST method, used to create a new device; DELETE to remove a device,
and, in addition, the LIST method, which allows all devices connected to the platform to be listed.
Pros: It hides device heterogeneity and provides a way to integrate devices into Web applications.
Cons: Security and Device Discovery are challenges.
Use Case
The Monitor Temperature and Heartbeat application is the user interface in a smartphone that
combines physical and Web resources in the RESTful API. The real-time data view is used to obtain
current data from WSNs. The smartphone updates this information by sending a GET to the gateway.
The device number of the temperature sensor is what gets current internal lab room temperature as
used in Smart Health environments [105].
8.6. Xively
Xively provides an API for managing data from the sensors/devices through cloud services.
It allows historical data and provides events based on the data generated by sensors/devices. It was
created based on the EcoDiF platform [24], Based on REST principles and Web standards such as
HTTP and URIs. To minimize the incompatibility among different devices, the platform provides
standardized interfaces. The data is organized into data points, streams, and feeds. A feed represents
an environment data (i.e., a room) with its data streams, representing data sent by a particular sensor
in that environment (i.e., temperatures of the monitored environment).
Xively is a commercial and closed source solution [106]. There are little details about the
architecture of this platform, which is shown in Figure 28. The sensors send data to the platform in
JSON, XML or CSV formats using the REST API, via sockets and through the MQTT protocol [107].
However, it is known that there are three ways to manage the devices connected to Xively. In the first
case, through the methods implemented by HTTP, the GET method is used by a client program to
retrieve data from a feed or data streams. The PUT method is used in the connected devices to send
data. In the second case, a socket can be created to avoid the overhead of opening and closing HTTP
communications under conditions in which too much data is exchanged. In addition, the first two
cases allow the use of the SSL/TLS protocol to provide authentication and data encryption. Finally,
Sensors 2019, 19, 676 28 of 40
the third case uses the publish and subscribe features of the MQTT protocol to send and retrieve data
from devices.
Pros: Integrate with devices easily.
Cons: Displays the minimum device notification service.
Use Case
A scalable platform that addresses need residential customers and contractors were developed by
SunStat Connect Thermostat, called Watts Water’s SunTouch [108].
The Xively IoT Platform is used to power the remote connectivity of SunStat thermostats, which
work with all SunTouch heating products. Furthermore, the Xively provides nearly instantaneous
response times from the devices, while not sacrificing stability and reliability that consumers would
expect from the heating control device. The Xively platform developed remote connectivity in the
SunStat application, enabling consumers to control SunStat devices from a Web browser or mobile
device from anywhere in the world connected to the Internet.
Another application is Blueprint [109], that consists of a scalable object directory model with a
fast MQTT-based messaging broker. It has a secure provisioning process, which supports millions of
secure connections between people, devices, and data around the world.
8.7. Carriots
Carriots is an IoT platform that manage data devices provided with cloud services, and that also
connects devices to other devices and systems [110]. Therefore, if a system is connected to the platform,
it can also be modeled as a device. From its RESTful API, Carriots aim to collect and store any data
originated from the most diverse devices. The application engine can guarantee availability to its users
no matter the volume of connected devices. These connected devices are associated with services
(i.e., physical devices or other resources) and all services belong to a project. As shown in Figure 29,
the logical architecture of Carriots consists of the following modules: (i) the REST API; (ii) Big Data;
(iii) Project and Device Management; (iv) Business Rules and Event Processing; (v) Security; (vi) Logs
and Debug; (vii) Control Panel, and; (viii) External Communication Module.
Data exchanged between devices, connected systems, and the platform can be represented in two
different ways: (i) the sensors send data in JSON or XML formats (in a particular platform format)
using the REST API, or (ii) through the MQTT message protocol [111].
The Project and Device Management module contains the projects created by users and provides
device and its software management, i.e., device provisioning, enabling and disabling devices,
and updating firmware. Storing and executing events in the form of scripts created using the Groovy
programming language and using if-then-else rules is the responsibility of the Business Rules and
Event Processing module.
Pros: Application used to trigger the other functionality are supported
Cons: less friendly user interface.
Sensors 2019, 19, 676 29 of 40
Use Case
Nowadays, cities have the challenge of improving, protecting the environment, decreasing
energy use, and reducing CO2 emissions, as well as having to detect and correct any excesses in light
consumption or in water spillage and control expenses.
Carriots City Life is an IoT platform that works like the city brain. It collects data from
different sensors or information reported by the citizens and mixes it all to better manage municipal
services [112]. it is a cloud platform that allows people to collect, integrate, store and analyze all the
city data with a global vision.
The IoT Network Management protocols (Table 5) were originated by the IETF for management
of connected devices. The SNMP protocol was the basis for the creation of other protocols such as
IoT-PIC and LNMP. Its simplicity in data modeling makes it a fast and a simple configuration protocol.
NETCONF was created to be the successor of SNMP using the XML standard for request and response
messages. The secure connection transport on SNMP is relevant because its ease of configuration
in some scenarios. With the emergence of SDNs, new network management protocols have been
Sensors 2019, 19, 676 30 of 40
proposed, such as OVSDB. It uses JSON technology to expose its devices and network data for the
systematic integration of applications.
The IoT Device Management protocols (Table 6) were developed with Internet standards by
the IETF. The TLS protocol and SSL protocol are used to secure transport of the information in the
network as HTTPS and SSH protocols. In reference to the data modeling and encoding, the OVSDB
and COMAN protocols use current Web technologies, such as XML and JSON, that expose network
and device information to access other applications through a user name and password.
Table 7 summarizes a comparison among the most relevant IoT Network Management platforms,
considering IMPReSS, OpenNMS, OpenDayLight, and Zabbix.
All the platforms have Web user-interfaces and open-source technologies, except IMPReSS (which
was finalized in 2016). OpenDaylight supports more IoT Network Management protocols compared to
other previously researched solutions. Zabbix is a popular platform for monitoring and management
networks and differ in XMPP and NETCONF protocol with OpenNMS.
Table 8 summarizes a comparison among the most relevant IoT Device Management platforms,
considering Xively, OneM2M, ManIoT, and other important solutions, regarding several important
protocols and types of management approaches.
Despite attending to most requirements, SmartThings believe that supporting widely used
protocols and Web technologies is enough to mitigate the problem of heterogeneity devices. However,
support for other protocols is an important requirement for Carriots and Xively platforms. Other
requirements (like context-awareness and dynamic adaptation) are barely discussed. Context-awareness
is an approach to the inclusion of semantic data in a platform, e.g., location and collection time.
Sensors 2019, 19, 676 31 of 40
YOAPY [113] EcoDIF [24] RestThing SmartThings IFTTT [114] ManIoT Xively Carriots Fiware ONEM2M
OpenSource X X X X X X X
Heterogeneity X X X X X X X X X
Security and
Privacy X X X X X X X X
Scalability and
Reliability X X X X X X X X X
RFID X X X X X X X
CoAP X X X X X X X X X
OMA-DM X X X X X
OMA-L2M2M X X X X X
TMP
CWMP X X
6LoWPAN X X X X X X
SOA X X X X X X
Data
Management X X X X X
Device
Management X X X X X X X X X
Local
Management X X X X X X X
Global
Management X X X X X X X X X X
Remote
Management X X X X X X X X X X
Context
Management X X X X X X
Sensors 2019, 19, 676 32 of 40
Platforms and new solutions are based on the SNMP architecture protocol, as shown in [115,116],
such as the use of the OVSDB protocol for the SDN architecture and the XMPP protocol shown in
IoT-PIC. SNMP uses more efficient resources thus responding to a processing request up to ten times
faster than NETCONF according to the study presented in [7,117,118]. The OpenDayLight modular
platform supports more network protocols for IoT, such as SNMP, NETCONF, IoT-PIC/XMPP, OVSDB,
and additional features. Then, it can be considered the best platform among the studied IoT Network
Management platforms.
Figure 30 presents the percentage of the main resources obtained from the surveyed protocols
and platforms for IoT management. The studies presented in [6,11,93,119] show the percentage of use
of the main raised resources are accounted and demonstrated.
Figure 30. Percentage of resources used in IoT management protocols and platforms.
As may be seen, almost all the IoT Device Management platforms solved the heterogeneity and
interoperability issue but, for network management, it stills a challenge given they only propose
6LoWPAN network management but SDN and Mesh networks are not supported. Given the protocols
and platforms, only about 50% used a standard communication model of networks and devices.
Security and context awareness of networks and devices are challenges that stills open. Both types
of management have an adoption of open-source protocols and platforms with about 60% of all the
surveyed technologies. Some protocols or platforms have a range of features but requirements such as
security and interoperability are developed in different ways for each one. Thus, no IoT management
platform and protocol meets all the requirements.
Based on this study, it is concluded that IoT Device Management stills in an early stage.
The requirements have not been completely explored. Nevertheless, ManIoT and ONEM2M can
be considered the best open-source solutions. ONEM2M supports a wide range of management
protocols. Xively is the best proprietary platform according to the mapped characteristics. No solution
can cover all the requirements of a RAs. Thus, there are open research issues due to divergences
between the available technologies and research approaches.
Thus, there is a need to transmit simpler and smaller packets while not overlooking
device security.
3. Security: it is a key issue to favor the advancement of IoT. However, due to devices heterogeneity,
each company uses different security protocols. Therefore, standardization is an important
challenge. Moreover, as the importance and popularity of IoT devices increases and people
provide more information on the topic, scammers and the most experienced cyber-criminals
continue to search new ways to attack and compromise devices. Consequently, research related
to this topic is on the rise in the research community.
4. Real-time management: various types of IoT application domains require high network
availability. Health applications, for example, have a critical degree of availability and, therefore,
require real-time management. However, limited device resources and power savings are related
features for a management solution that should not be overhead in its communication within
the network.
5. Interoperability: There are currently several types of devices, protocols, and communication
technologies that determine the heterogeneity of IoT networks. These devices must communicate
and inter-operate to provide a network service to users. Some research studies assume that new
gateways must support several protocols. Furthermore, there is still research on low power
device networks as shown in [120].
6. Scalability: The number of devices connected to the network increases exponentially and, thus,
the scalability of IoT networks is a critical requirement. The solutions found in literature do
not address features regarding scalability. With this, IoT Network Management must support
scalability due to the great evolution of IoT devices and related technologies.
10.2. Conclusions
A large number of IoT devices demands management and control solutions for various services.
Moreover, the exponential number of connected devices and their inherent constraints motivate the
need for efficient management of IoT networks. Therefore, platforms that integrate these services
are necessary. However, IoT management current platforms only partially attend to the literature
requirements. Overall, this paper presented the concept in detail, its enabling technologies, protocols,
Sensors 2019, 19, 676 34 of 40
platforms, and the recent research addressing IoT management for networks and devices. Among
the IoT features, solutions (protocols and platforms) that performs better in terms of scalability,
interoperability, security, energy saving, etc. were studied.
Concerning network management, IoT network solutions continue based on the SNMP protocol.
The support for each platform search for improving the latency, scalability, and robustness. NETCONF
protocol was developed to be the natural successor of SNMP, as SNMP is focused on monitoring
and not on network configuration. The OpenDayLight platform can be considered the best solution
based on the supported protocols. For IoT devices management, ONEM2M open-source approach
and Xively proprietary technology were evaluation with other technologies. It was observed that
ONEM2M and Xively predict scalability and promote the integration of devices with local/remote
management features always remembering the guarantee the heterogeneity and security.
Finally, the main goal to achieve regarding the best choice for IoT Network Management protocols
and platforms for a real IoT management solution was attained since important insights, a detailed
description and discussion on the topic was performed. Further research works on the topic were
also identified.
Author Contributions: The 1st author J.d.C.S. collected and performed a deep analysis and review the related
literature on the topic, wrote the first draft of the document, performed the comparison study and identified some
open research issues. The 2nd author J.J.P.C.R. supervised all the study, consolidated the comparison analysis and
open issues, reviewed the structure and the first draft. All the other authors J.A.-M., R.A.L.R., and V.F. reviewed
the text carefully, verified the comparison study, and reviewed the identified open issues. All the authors J.d.C.S.,
J.J.P.C.R, J.A.-M., R.A.L.R., and V.F. contributed equally to the scope definition, motivation, and focus of the paper.
Funding: This work has been supported by the National Funding from the FCT—Fundação para a Ciência e a
Tecnologia through the UID/EEA/500008/2013 Project; by Finatel through the Inatel Smart Campus project; by
Finep, with resources from Funttel, grant no. 01.14.0231.00, under the Radiocommunication Reference Center
(Centro de Referência em Radiocomunicações—CRR) project of the National Institute of Telecommunications
(Instituto Nacional de Telecomunicações—Inatel), Brazil; by Brazilian National Council for Research and
Development (CNPq) via Grant No. 309335/2017-5.
Acknowledgments: The authors extend their appreciation to the International Scientific Partnership Program
ISPP at King Saud University for funding this research work through ISPP #0129.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Bonaventure, O. Computer Networking: Principles, Protocols and Practice; The Saylor Foundation: Washington,
DC, USA, 2011.
2. Zanella, A.; Bui, N.; Castellani, A.; Vangelista, L.; Zorzi, M. Internet of Things for smart cities. IEEE Internet
Things J. 2014, 1, 22–23, doi:10.1109/JIOT.2014.2306328.
3. Singh, K.J.; Kapoor, D.S. Create Your Own Internet of Things: A survey of IoT platforms. IEEE Consum.
Electron. Mag. 2017, 6, 57–68.
4. Du, X.; Xiao, Y.; Guizani, M.; Chen, H.H. An effective key management scheme for heterogeneous sensor
networks. Ad Hoc Netw. 2007, 5, 24–34.
5. Ngu, A.H.; Gutierrez, M.; Metsis, V.; Nepal, S.; Sheng, Q.Z. An effective key management scheme for
heterogeneous sensor networks. IEEE Internet Things J. 2017, 4, 1–20.
6. Qiu, T.; Chen, N.; Lib, K.; Qiaoc, D.; Fud, Z. Heterogeneous ad hoc networks: Architectures, advances and
challenges. Ad Hoc Netw. 2017, 55, 143–152, doi:10.1016/j.adhoc.2016.11.001.
7. Slabicki, M.; Grochla, K. Performance evaluation of CoAP, SNMP and NETCONF protocols in fog computing
architecture. In Proceedings of the NOMS 2016—2016 IEEE/IFIP Network Operations and Management
Symposium, Istanbul, Turkey, 25–29 April 2016; doi:10.1109/NOMS.2016.7503010.
8. Tayur, V.M.; Suchithra, R. Internet of Things Architectures: Modeling and Implementation Challenges.
In Proceedings of the International Conference, “Computational Systems for Health & Sustainability”,
Bangalore, India, 17–18 April 2015.
Sensors 2019, 19, 676 35 of 40
9. Benamar, N.; Jara, A.; Ladid, L.; Ouadghiri, D.E. Challenges of the Internet of Things: IPv6 and Network
Management. In Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing
(IMIS), Birmingham, UK, 2–4 July 2014; doi:10.1109/IMIS.2014.43.
10. Atzori, L.; Iera, A.; Morabito, G. The Internet of Things: A survey. Comput. Netw. 2010, 54, 2787–2805,
doi:10.1016/j.comnet.2010.05.010.
11. Meng, M.; Ping, W.; Chao-Hsien, C. Data Management for Internet of Things: Challenges, Approaches
and Opportunities. In Proceedings of the IEEE and Internet of Things Conference (iThings/CPSCom 2013),
Beijing, China, 20–23 August 2013; doi:10.1109/GreenCom-iThings-CPSCom.2013.199.
12. Passemard, A. The Internet of Things Protocol stack—From sensors to businesss value. Internet of Things
(IoT) Talks, 29 January 2014.
13. Ruiz, L.B.; Nogueira, M.S.J.; José, M.S.; Loureiro, A.A. MANNA: A management architecture for wireless
sensor networks. IEEE Commun. Mag. 2003, 41, 116–125.
14. Pires, P.F.; Cavalcante, E.; Barros, T.; Delicato, F.C.; Batista, T.; Costa, B. A platform for integrating physical
devices in the Internet of Things. In Proceedings of the 12th IEEE International Conference on Embedded
and Ubiquitous Computing, Milano, Italy, 26–28 August 2014; pp. 234–241.
15. Clemm, A. Network Management Fundamentals; Cisco Press: Indianapolis, IN, USA, 2007.
16. Athreya, A.P.; Tague, P. Network Self-Organization in the Internet of Things. In Proceedings of the 10th
Annual IEEE Communications Society Conference Sensor, Mesh and Ad Hoc Communications and Networks
(SECON), New Orleans, LA, USA, 24 June 2013; doi:10.1109/SAHCN.2013.6644956.
17. Lee, S.; Levanti, K.; Kim, H.S. Network monitoring: Present and future. Comput. Netw. 2014, 65, 84–98,
doi:10.1016/j.comnet.2014.03.007.
18. Kurose, J.F.; Ross, K.W. Computer Networking: A Top-Down Approach Featuring the Internet, 6th ed.; Pearson:
London, UK, 2010.
19. Gabdurahmanov, M.; Trygg, S. Analysis and Evaluation of Network Management Solutions; Degree Project in
Computer Engineering, First Cycle; KTH Royal Institute of Technology: Stockholm, Sweden, 2011.
20. Vermesan, O.; Friess, P. Internet of Things—From Research and Innovation to Market Deployment; River Publishers
Series in Communication; River Publishers: Aalborg, Denmark, 2014.
21. Sanchez, L.; McCloghrie, K.; Saperia, J. RFC3139: Requirements for Configuration Management of IP-Based
Networks. 2001. Available online: https://tools.ietf.org/html/rfc3139 (accessed on 6 May 2017).
22. Peterson, L.L.; Davie, B.S. Computer Networks: A Systems Approach, 3rd ed.; Morgan Kaufmann Series in
Networking; Elsevier: Amsterdam, The Netherlands, 2012.
23. Zhou, C.; Zhang, X. Toward the Internet of Things Application and Management: A Practical Approach.
In Proceedings of the IEEE 15th International Symposium on World of Wireless, Mobile and Multimedia
Networks (WoWMoM), Sydney, NSW, Australia, 19 June 2014; doi:10.1109/WoWMoM.2014.6918928.
24. Delicato, F.C.; Pires, P.F.; Batista, T. Middleware Solutions for the Internet of Things; SpringerBriefs in Computer
Science; Springer: Berlin, Germany, 2013.
25. Perera, C.; Member, S.; Zaslavsky, A.; Christen, P. Context Aware Computing for The Internet of Things:
A Survey. IEEE Commun. Surv. Tutor. 2013, 16, 414–454, doi:10.1109/SURV.2013.042313.00197.
26. Song, B.; Cheong, Y.; Lee, T.; Jeong, J. Design and Security Analysis of Improved Identity Management
Protocol for 5G/IoT Networks. In Proceedings of the World Conference on Information Systems and
Technologies, Naples, Italy, 27–29 March 2018; doi:10.1007/978-3-319-56538-5_32.
27. Bauer, M.; Boussard, M.; Bui, N.; Carrez, F.; Jardak, C.; Loof, J.D.; Magerkurth, C.; Meissner, S.; Nettsträter, A.;
Olivereau, A. Deliverable D1.5—Final Architectural Reference Model for the IoT v3.0. Available online:
http://www.meet-iot.eu/deliverables-IOTA/D1_5.pdf (accessed on 10 March 2018).
28. Ma, Y.; Chen, J.; Huang, Y.; Lee, M. An Efficient Management System for Wireless Sensor Networks. Sensors
2010, 10, 11400–11413, doi:10.3390/s101211400.
29. Case, J.; Fedor, M.; Schoffstall, M.; Davin, J. RFC 1157—Simple Network Management Protocol (SNMP).
Network Working Group, May 1990. Available online: https://tools.ietf.org/html/rfc1157/ (accessed on
6 May 2017).
30. SNMP Research. Simple Network Management Protocol. SNMP Research International. Available online:
http://www.snmp.com/protocol/ (accessed on 6 May 2017).
31. Specialski, E.S. Management of Computer Networks and Telecommunications. Master’s Thesis, University
of Santa Catarina, Florianópolis, SC, USA, 2002.
Sensors 2019, 19, 676 36 of 40
32. Ericsson, A.B. Simple Network Management Protocol 5.2.5 (SNMP) - Erlang. Available online: http://erlang.
org/doc/apps/snmp/snmp.pdf (accessed on 10 March 2018).
33. ASN.1 PROJECT. Introduction to ASN.1. ITU-T. Available online: http://www.itu.int/en/ITU-T/asn1/
Pages/introduction.aspx (accessed on 6 May 2017).
34. OpenNMS—Open Networks Management System. The OpenNMS Group. Available online: https://www.
opennms.org/en (accessed on 22 May 2017).
35. Enns, R.; Bjorklund, M.; Schoenwaelder, J.; Bierman, A. RFC 6241—Network Configuration Protocol
(NETCONF). Internet Engineering Task Force (IETF), June 2011. Available online: https://tools.ietf.org/
html/rfc6241 (accessed on 15 May 2017).
36. Bjorklund, M. RFC 6020—YANG—A Data Modeling Language for NETCONF. Internet Engineering Task
Force (IETF), October 2010. Available online: https://tools.ietf.org/html/rfc6020 (accessed on 15 May 2017).
37. Xu, H.; Wang, C.; Liu, W.; Chen, H. NETCONF-based Integrated Management for Internet of Things using
RESTful Web Services. Int. J. Future Gener. Commun. Netw. 2012, 5, 73–82.
38. Chappell, C. White Paper Creating the Programmable Network: The Business Case for NETCONF/YANG in Network
Devices; Heavy Reading: New York, NY, USA, October 2013.
39. Pfa, B.; Davie, B. RFC 7047—The Open vSwitch Database Management Protocol. Internet Engineering
Task Force (IETF), December 2013. Available online: https://tools.ietf.org/html/rfc7047 (accessed on
16 May 2017).
40. Davie, B.; Koponen, T.; Pettit, J.; Pfa, B.; Casado, M.; Gude, N.; Petty, T. Public Review for A Database
Approach to SDN Control Plane Design. ACM SIGCOMM Comput. Commun. Rev. 2017, 47, 15–26.
41. Beryllium, R. OpenDaylight Project. Available online: https://wiki.opendaylight.org/view/Documentation
(accessed on 10 March 2018).
42. Pastrone, C.; Boella, M.; Spirito, M.; Tomasi, R.; Rizzo, F. A Jabber-Based Management Framework for
Heterogeneous Sensor Network Applications. ACM SIGCOMM Comput. Commun. Rev. 2008, 47, 15–26.
43. Scheck, M. Performance tests XMPP. IoT Messaging Protocols, 31 March 2015. Available online: https:
//iotprotocols.wordpress.com/2015/03/31/performance-tests-xmpp/ (accessed on 23 February 2017).
44. Stanik, A.; Kao, O. A proposal for REST with XMPP as base protocol for intercloud communication.
In Proceedings of the 7th International Conference on Information, Intelligence, Systems & Applications
(IISA), Chalkidiki, Greece, 13–15 July 2016; doi:10.1109/IISA.2016.7785436.
45. IMPReSS Consortium—D3.4 Network Management. EU-Brazil Research and Development Cooperation.
Available online: http://impressproject.eu/downloads/deliverables/D3.4_Network_Management.pdf
(accessed on 22 May 2017).
46. Yan, H. Smart Devices Collaboration for Energy Saving in Home Networks. Préparée à L’unité de Recherche
IRISA (UMR 6074). Ph.D. Thesis, Institut de Recherche en Informatique et Systèmes Aléatoires, Rennes,
France, 2014.
47. Yan, H.; Fontaine, F.; Yan, H.; Fontaine, F. An adaptive proxy for compliance of the equipments to IEEE 1905.
Patent 1454940, France, February 2014.
48. IEEE. IEEE Standard for a Convergent Digital Home Network for Heterogeneous Technologies; IEEE: New York, NY,
USA, April 2013; doi:10.1109/IEEESTD.2013.6502164.
49. Palm, S. Connected home—Focus on Networked Power Save and Management. In Proceedings of the
ACEEE Intelligent Efficiency Conference: Program, San Francisco, CA, USA, 16–18 November 2014.
50. Neves, P. A.C.; Rodrigues, J.J.P.C. Internet Protocol over Wireless Sensor Networks, from Myth to Reality.
J. Commun. 2010, 5, 189–196.
51. Sehgal, A.; Perelman, V.; Kuryla, S.; Schönwälder, J. Management of Resource Constrained Devices in the
Internet of Things. IEEE Commun. Mag. 2012, 50, 144–149, doi:10.1109/MCOM.2012.6384464.
52. Ayala, G.; Poskal, P.; Gamess, E. SNMP JManager: An Open Source Didactic Application for Teaching
and Learning SNMP v1/2c/3 with Support for IPv4 and IPv6 . In Proceedings of the Seventh LACCEI
Latin American and Caribbean Conference for Engineering and Technology (LACCEI’2009), San Cristóbal,
Venezuela, 2–5 June 2009.
53. Mukhtar, H.; Kang-myo, K.; Chaudhry, S.A.; Akbar, A.H.; Ki-hyung, K.; Yoo, S. LNMP—Management
Architecture for IPv6 based low-power Wireless Personal Area Networks (6LoWPAN). In Proceedings of the
Network Operations and Management Symposium, Salvador Da Bahia, Brazil, 7–11 April 2008; pp. 417–424,
doi:10.1109/NOMS.2008.4575163.
Sensors 2019, 19, 676 37 of 40
54. Kushalnagar, N.; Montenegro, G.; Schumacher, C. RFC 4919—6LoWPAN: Overview, Assumptions, Problem
Statement and Goals; Network Working Group: Gatineau, QC, Canada, August 2007.
55. Kim, K.; Yoo, S.; Park, D.; Lee, J.; Mulligan, G. Hierarchical Routing over 6LoWPAN (HiLow); Network Working
Group: Gatineau, QC, Canada, December 2007.
56. Fernandes, J.; Nati, M.; Loumis, N.S.; Nikoletseas, S.; Raptis, T.P.; Krco, S.; Ziegler, S. IoT Lab: Towards
co-design and IoT solution testing using the crowd. In Proceedings of the International Conference on Recent
Advances in Internet of Things (RIoT), Singapore, 7–9 April 2015; pp. 1–6.
57. Adjih, C. FIT IoT-LAB: A large scale open experimental IoT testbed. In Proceedings of the IEEE 2nd World
Forum Internet Things (WF-IoT), Milan, Italy, 14–16 December 2015; pp. 459–464.
58. IMPReSS Consortium—D7.3.2 Final Design and Implementation of the Configuration and
Composition Manager. EU-Brazil Research and Development Cooperation. Available online:
http://www.compose-project.eu/sites/default/files/publications/D7.3.2%20-%20Use%20cases%
20implementation%E2%80%93%20Final%20version.pdf (accessed on 22 May 2017).
59. The OpenNMS Group. OpenNMS—Open Network Management System Wiki. October 2015. Available
online: https://wiki.opennms.org/wiki/Severity (accessed on 29 May 2017).
60. Haleplidis, E.; Hadi Salim, J.; Denazis, S. Towards a Network Abstraction Model for SDNs. J. Netw.
Syst. Manag. 2015, 23, 309–327, doi:10.1007/s10922-014-9319-3.
61. Olups, R. Zabbix 1.8 Network Monitoring; Packet Publishing: Birmingham, UK, 2010; ISBN 978-1-847197-68-9.
62. Dalle Vacche, A.; Kewan Lee, S. Mastering Zabbix; Packt Publishing: Birmingham, UK, December 2013;
ISBN 978-1-78328-349-1
63. Tormo, G.D.; Marmol, F.G.; Perez, G.M. Dynamic and flexible selection of a reputation mechanism for
heterogeneous environments. Future Gener. Comput. Syst. J. 2014, doi:10.1016/j.future.2014.06.006.
64. Liu, Z.; Liu, F.; Lin, K. Agent-Based Device Management in RFID Middleware. In Proceedings of the 4th
International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM’08),
Dalian, China, 12–17 October 2008; doi:10.1109/WiCom.2008.691.
65. Bera, S.; Misra, S.; Roy, S.K.; Obaidat, M.S. Soft-WSN: Software-Defined WSN Management System for IoT
Applications. IEEE Syst. J. 2016, 12, 2074–2081, doi:10.1109/JSYST.2016.2615761.
66. Greevenbosch, B.; Li, K.; Van der Stok, P. Candidate Technologies for COMAN. Internet Engineering Task
Force (IETF), p. 26. Available online: http://tools.ietfs.org/html/draft-greevenboschcoman-candidate-tech-03
(accessed on 16 May 2017).
67. Lamaazi, H.; Benamar, N.; Jara, A.; Ladid, L.; El Ouadghiri, D. Internet of thing and networks management:
Lnmp, snmp, coman protocols. In Proceedings of the First International Workshop on Wireless Networks
and Mobile COMmunications (WINCOM 2013), Fez, Morocco, 25 December 2013; pp. 1–5.
68. Sheng, Z.; Wang, H.; Yin, C.; Hu, X.; Yang, S.; Leung, V.C. Lightweight management of resource-constrained
sensor devices in internet of things. IEEE Internet Things J. 2015, 2, 402–411.
69. Castro, M.; Jara, A.J.; Skarmeta, A.F. Enabling end-to-end coap based communications for the web of things.
J. Netw. Comput. Appl. 2016, 59, 230–236.
70. Open Mobile Alliance (OMA). OMA Device Management Standardized Objects, version 1.3; OMA: San Diego,
CA, USA, May 2010,
71. Open Mobile Alliance (OMA). OMA DM Device Description Framework, version 1.3; OMA: San Diego, CA,
USA, October 2012.
72. Open Mobile Alliance (OMA). OMA Device Management Tree and Description, version 1.3; OMA: San Diego,
CA, USA, October 2012.
73. Open Mobile Alliance (OMA). OMA Device Management Protocol, version 1.3; OMA: San Diego, CA, USA,
May 2016.
74. Chu, N.; Raouf, D.; Corlay, B.; Ammari, M.; Gligoric, N.; Krco, S.; Ognjanovic, N.; Obradovic, A. OMA DM
v1.x compliant Lightweight Device Management for Constrained M2M devices. Eur. Trans. Telecommun.
2013, 24, 517–531, doi:10.1002/ett.2662.
75. Yadav, V.; Verma, M.; Nisha. A Survey Paper on Wireless Access Protocol. Int. J. Comput. Sci. Inf. Technol.
2015, 6, 3527–3534.
76. Derhamy, H.; Eliasson, J.; Delsing, J.; Priller, P. A survey of commercial frameworks for the Internet of Things.
In Proceedings of the 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA),
Luxembourg, 8–11 September 2015; pp. 3527–3534, doi:10.1109/ETFA.2015.7301661.
Sensors 2019, 19, 676 38 of 40
77. Pulipati, M.; Phani, S.K. Comparison of Various Short Range Wireless Communication Technologies with
NFC. Inter. J. Sci. Res. 2013, 2, 87–91 .
78. Kang, J.; Ju, H.; Choi, M.; Won-Ki Hong, J.; Kim, J. OMA DM-based remote software fault management for
mobile devices. Int. J. Netw. Manag. 2009, 19, 457–548, doi:10.1002/nem.724.
79. Klas, G.; Rodermund, F.; Shelby, Z.; Akhouri, S.; Höller, J. Lightweight M2M: Enabling Device Management and
Applications for the Internet of Things; Ericsson and Vodafone White Paper; Ericsson: Stockholm, Sweden, 2014.
80. Ocak, M.C. Implementation of an Internet of Things Device Management Interface. Master’s Thesis, School
of Electrical Engineering, Alto University, Greater Helsinki, Finland, November 2014.
81. Putera, C.A.L.; Lin, F.J. Incorporating OMA Lightweight M2M protocol in IoT/M2M standard architecture.
In Proceedings of the 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy,
14–16 December 2015; doi:10.1109/WF-IoT.2015.7389115.
82. Rao, S.; Chendanda, D.; Deshpande, C.; Lakkundi, V. Implementing LWM2M in constrained
IoT devices. In Proceedings of the IEEE ICWiSe 2015, Melaka, Malaysia, 24–26 August 2015;
doi:10.1109/ICWISE.2015.7380353.
83. Red Band Software. FOTA Usage in the United States; Case Study and Success Story; Red Band Software:
Waltham, MA, USA, November 2011.
84. Chowdhury, S.N.; Kuhikar, K.M.; Dhawan, S. IoT Architecture: A Survey. Int. J. Ind. Electron. Electr. Eng.
2015, 3, 88–92.
85. Dai, G. Design and implementation on SOAP-based things management protocol for internet of things.
In Proceedings of the 10th World Congress Intelligent Control and Automation (WCICA), Beijing, China,
6–8 July 2012; pp. 4305–4308, doi:10.1109/WCICA.2012.6359203.
86. Wisys Technologies. EZLux—Smart Street Lighting. Available online: https://wisystech.com/solutions/
ezlux-smart-street-lighting-bangalore/ (accessed on 18 May 2017).
87. Hillen, B.A.G.; Passchier, I.; Matthijssen, E.F.; den Hartog, F.T.H.; Selgert, F. Remote management
of mobile devices with broadband forum’s TR-069. In Proceedings of the Telecommunications
Network Strategy and Planning Symposium, Budapest, Hungary, 28 September–2 October 2008;
doi:10.1109/NETWKS.2008.6231307.
88. TR-69 CWMP v1.4 Especifications. Available online: https://www.broadband-forum.org/technical/
download/TR-069.pdf (accessed on 11 September 2017).
89. Husain, S.; Prasad, A.; Kunz, A.; Papageorgiou, A.; Song, J. Recent Trends in Standards Related to the Internet
of Things and Machine-to-Machine Communications. J. Inf. Commun. Converg. Eng. 2014, 12, 228–236.
90. Lee, K.; Chu, H.; Chu, J.; Lin, Y.; Hsiao, C.; Hou, T. ACS management capacity enhancement mechanism in
CWMP. Electron. Lett. 2014, 50, 118–120.
91. Roll Out New Services with TR-069: A Cable IPTV Use Case. Available online: http://www.incognito.com/
wp-content/uploads/cable-tr-069-iptv-use-case (accessed on 11 September 2017).
92. Wang, T.H.; Chen, Y.C.; Hsu, C.M.; Hsu, K.S.; Young, H.C. Auto scaling of containerized ACSs for
CPE management. In Proceedings of the 2016 18th Asia-Pacific Network Operations and Management
Symposium (APNOMS), Kanazawa, Japan, 5–7 October 2016; pp. 1–4.
93. Santos, M.; Castro, T.O.; Macedo, D.F.; Horizonte, B. ManIoT: A Platform for Management of Internet Devices
of Things. In Proceedings of the Brazilian Symposium on Computer Networks and Distributed Systems,
Campos do Jordao, Brazil, 6–10 May 2016.
94. Stravoskoufos, K.; Sotiriadis, S.; Petrakis, E. Iot-a and fiware: bridging the barriers between the cloud
and iot systems design and implementation. In Proceedings of the 6th International Conference on Cloud
Computing and Services Science (CLOSER 2016), Rome, Italy, 23–25 April 2016; pp. 23–25.
95. FIWARE IoT Stack. Available online: https://www.fiware.org/ (accessed on 8 June 2017).
96. FIWARE Wiki. Available online: http://forge.fiware.org/plugins/mediawiki/wiki/fiware/index.php/
Main_Page (accessed on 28 July 2017).
97. FIWARE Map. Available online: http://map.fiware.org/actors/smes/434 (accessed on 28 July 2017).
98. Chang, W.G.; Lin, F.J. Challenges of incorporating OMA LWM2M gateway in M2M standard architecture.
In Proceedings of the 2016 IEEE Conference on Standards for Communications and Networking (CSCN),
Berlin, Germany, 31 October–2 November 2016; pp. 1–6.
Sensors 2019, 19, 676 39 of 40
99. Datta, S.K.; Bonnet, C. A lightweight framework for efficient M2M device management in oneM2M
architecture. In Proceedings of the 2015 International Conference on Recent Advances in Internet of Things
(RIoT), Singapore, 7–9 April 2015; pp. 1–6.
100. Swetina, J.; Lu, G.; Jacobs, P.; Ennesser, F.; Song, J. Toward a standardized common M2M service layer
platform: Introduction to oneM2M. IEEE Wirel. Commun. 2014, 21, 20–26.
101. Application Developer Guide—TR-0025 V1.0.0. ONEM2M Standards for M2M and the Internet of
Things, February 2016. Available online: ftp://ftp.onem2m.org/Work%20Programme/WI-0042/TR-0025-
Application_Developer_Guide-V2_0_2.DOC (accessed on 15 September 2017).
102. Application Developer Guide—Use Case. ONEM2M Standards for M2M and the Internet of
Things, 2017. Available online: http://onem2m.org/application-developer-guide/use-case (accessed on
15 September 2017).
103. Use Case for SmartThings Project. SmartThings Prokect. Available online: https://blog.smartthings.com/
tag/smartthings-use-cases/ (accessed on 12 May 2017).
104. Qin, W.; Li, Q.; Sun, L.; Zhu, H.; Liu, Y. Restthing: A restful web service infrastructure for mash-up physical
and web resources. In Proceedings of the IFIP 9th International Conference Embedded and Ubiquitous
Computing (EUC), Melbourne, VIC, Australia, 24–26 October 2011; pp. 197–204, doi:10.1109/EUC.2011.59.
105. Lavanya, S. A Smart Network: IoT to Monitor Temperature and Heart beat of a Person Using RFID
Technology. Int. J. Chem. Sci. 2016, 14, 901–905.
106. Ray, P.P. A survey of IoT cloud platforms. Future Comput. Inform. J. 2017, 1, 35–46, doi:10.1016/j.fcij.2017.02.001.
107. Jang, R.; Soh, W.; Jung, S. Design and Implementation of Data-Report Service for IoT Data Analysis.
In Proceedings of the International Conference on Chemical, Material and Food Engineering (CMFE-2015),
Kunming, China, 25–26 July 2015.
108. Wendel, A. Customer Spotlight: Watts Water. Xively Blog, 11 March 2016. Available online: http://blog.
xively.com/customer-spotlight-watts-water/ (accessed on 23 May 2017).
109. Lorenz, S. Blueprint: A Central Control Hub for Connected Products. Xively Blog, 28 May 2015. Available
online: https://blog.xively.com/blueprint-a-central-control-hub-for-connected-products/ (accessed on
23 May 2017).
110. carriots.com. Carriots–IoT Application Platform. Available online: https://www.carriots.com (accessed on
23 May 2017).
111. Zdravkovic, M.; Trajanovic, M.; Sarraipa, J.; Jardim-Gonçalves, R.; Lezoche, M. Survey of Internet-of-Things
platforms. In Proceedings of the 6th International Conference on Information Society and Techology,
ICIST 2016, Kopaonik, Serbia, 28 February–2 March 2016; HAL Id: hal-01298141.
112. Gluhak, A.; Vermesan, O.; Bahr, R.; Clari, F.; MacchiaMaria, T.; Delgado, T.; Hoeer, A.; Bösenberg, F.;
Senigalliesi, M.; Barchetti, V. D03.01 Report on IoT Platforms Activities. ICT-30-2015: Internet of Things and
Platforms for Connected Smart Objects. Available online: http://www.internet-of-things-research.eu/pdf/
D03_01_WP03_H2020_UNIFY-IoT_Final.pdf (accessed on 23 May 2017).
113. Jara, J.A.; Zamora, M.A.; Skarmeta, A.F. Knowledge acquisition and management architecture for mobile and
personal health environments based on the Internet of things. In Proceedings of the IEEE 11th International
Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool, UK,
25–27 June 2012; pp. 1811–1818, doi:10.1109/TrustCom.2012.194.
114. IFTTT—Connect the APPs You Love. Available online: https://ifttt.com/ (accessed on 18 May 2017).
115. Neha; Meena, M.S. Rajbir Implementation of SNMP (Simple Network Management Protocol) on Sensor
Network. Int. J. Adv. Res. Comput. Eng. Technol. 2016, 5, 2125–2127.
116. Huang, H.P.; Xiao, S.D.; Meng, X.Y. Applying SNMP Technology to Manage the Sensors in Internet of Things.
Open Cybern. Syst. J. 2015, 9, 1019–1024.
117. Hedstrom, B.; Watwe, A.; Sakthidharan, S. Protocol Efficiencies of NETCONF versus SNMP for Configuration
Management Functions. Ph.D. Thesis, University of Colorado, Denver, CO, USA, May 2011.
118. Marotta, M.A.; Both, C.B.; Rochol, J.; Granville, L.Z.; Tarouco, L.M.R. Evaluating Management Architectures
for Internet of Things Devices. In Proceedings of the 2014 IFIP IEEE—Wireless Days (WD), Rio de Janeiro,
Brazil, 12–14 November 2014; doi:10.1109/WD.2014.7020811.
119. Razzaque, M.A.; Milojevic-Jevric, M.; Palade, A.; Clarke, S. Middleware for Internet of Things: A Survey.
IEEE Internet Things J. 2016, 3, 70–95, doi:10.1109/JIOT.2015.2498900.
Sensors 2019, 19, 676 40 of 40
120. Silva, J.C.; Andery, F.; Mazzer, D.; Mendes, L.D.P. Factorial Design Analysis Applied to the Performance of
Transmission Power Optimization Techniques for Wireless Sensor Networks. In Proceedings of the XXII
Iberchip Workshop, Florianopolis, Brazil, 28 February–2 March 2016.
121. Bosch Software Innovations. IoT Platforms for Device Management: Positioning of Bosch Software
Innovations. Digit. CX IoT I Eur. 2017, doi:10.11601/ijates.v5i3.224.
122. Stusek, M.; Masek, P.; Zeman, K.; Kovac, D.; Cika, P.; Pokorny, J.; Kröpfl, F. A Novel Application of CWMP:
An Operator-grade Management Platform for IoT. Int. J. Adv. Telecommun. Electrotech. Signals Syst. 2016, 5,
171–177, doi:10.11601/ijates.v5i3.224.
123. Developer Documentation: Release 1.0. SmartThing Project, 2015. Available online: https://media.
readthedocs.org/pdf/smartthings/latest/smartthings.pdf (accessed on 12 May 2017).
124. Yaqoob, I.; Ahmed, E.; Hashem, I.A.T.; Ahmed, A.I.A.; Gani, A.; Imran M.; Guizani, M.; IEEE Communications
Society. Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges.
IEEE Wirel. Commun. 2017, 24, 10–16, doi:10.1109/MWC.2017.1600421.
125. Sinha, N.; Pujitha, K.E.; Alex, J.S.R. Xively based sensing and monitoring system for IoT. In Proceedings
of the 2015 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore,
India, Coimbatore, 8–10 January 2015; pp. 1–6.
c 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).